tutorial
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tutorial [2014/06/03 13:49] – [How to Empirically Evaluate your pet (Security but not only) Requirements Engineering Method] katsiaryna.labunets@unitn.it | tutorial [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 8: | Line 8: | ||
| ===Important Links==== | ===Important Links==== | ||
| Please visit [[http:// | Please visit [[http:// | ||
| - | [[http:// | + | [[http:// |
| + | Watch our video about previous experiments: | ||
| ====Relevance for the RE Conference and Intended Audience of the Tutorial==== | ====Relevance for the RE Conference and Intended Audience of the Tutorial==== | ||
tutorial.1401796192.txt.gz · Last modified: (external edit)
